Bill will share personal perspectives from his experience working as an academic researcher, automotive OEM product software developer, and automotive tier one product cybersecurity engineer. Researchers, OEMs, and tier one suppliers play vital roles in a secure development lifecycle, but they sometimes make wrong assumptions about one another or fail to see eye-to-eye. By providing insight into each area, Bill hopes to provide relevant suggestions for building trust and mitigating vulnerabilities in cyber-physical products.

Bill Hass, Cybersecurity Engineer, Lear Corporation

11:15 a.m.

HOT TOPIC DEBATES: Group Lightning Rounds

NDIA’s Hot Topics segment identifies the current and most controversial issues of cyber-physical security. These multiple round-table discussions present an opportunity for audience participants to offer recommendations and debate positions relative to solutions.

Topic 1: Product Security Screening Prior to Integration

Topic 2: Preparing the Workforce: Degrees versus Certifications

Topic 3: Flowing Down Security Requirements: Who will be responsible? OEM vs Supplier

Topic 4: Trusting Untrusted Electronics: Can there be a trust between two different industries

Topic 5: Pathway to Security: OTA debate

12:00 p.m.

NETWORKING LUNCH

1:00 p.m.

LIVE Taping of Autoline This Week: Implications of an Insecure Trucking Industry

In today’s automotive market, we are presented with the opportunities and challenges of future mobility. In this panel discussion, we will focus on the direct impacts of technological advances within the heavy truck segment.

Larry Hilkene, Chief Product Cybersecurity Engineer, Cummins Inc.

David Sasaki, PACCAR (invited)

2:00 p.m.

TED Talk: You Can’t Take the Human Out of Technology: Building the Cybersecurity Workforce Begins and Ends with Human Resources

Cyndi Millns, Professional Faculty, Cybersecurity at Washtenaw Community College

Point/Counterpoint delivery of the audience’s discussion on the industry’s most debated topics. Audience participation.

4:00 p.m.

Panel Conversation: Cyber Talent: Developing the Next Generation

The cybersecurity industry and the demand for talent outweighs the current supply of those with the right skills. This candid conversation explores partnerships and programs that create a future talent pipeline, addresses creative solutions for talent/workforce development, and confronts “old-school” tactics and other human resource challenges for capturing today’s top cyber talent.

WEDNESDAY, MARCH 6TH, 2019

7:30 a.m.

NETWORKING BREAKFAST

8:30 a.m.

Opening Remarks

8:35 a.m.

TED Talk: The Right, The Wrong Way, and the Army Way

Remember the Lego movie? Admit it – you saw it with a child or grandchild…right? Remember how they tried to get out of situation with all kinds of new builds and creativity and it kept failing? Remember how in the end, they realized the solution was attained by APPLYING THE RULES EXACTLY?

What if…what if the Army is the most advanced organization to roll out and deploy a fleet-wide (combat and A&L vehicles – even completely non-tactical system) in the world? What if we are already there – we just need to realize it? What if not adopting – but EMBRACING cybersecurity is completely within our scope with low-to-no retraining of operator and -10/-20 maintenance personnel?

8:50 a.m.

TED Talk: Cyber/ Physical Security: Approaches to Solutions

Speaker TBD, General Dynamics Mission Systems

9:05 a.m.

Panel Conversation: Balancing Security Against Requirements

Program Managers (PMs) must balance capability requirements, regulations, and cost as they manage new system acquisitions. This panel will address how PMs meet their cybersecurity needs, and how those needs align or conflict with existing requirements.

A demo of Eclypses’ MicroToken solution for securing data in motion. A showing of how the MTE packets secure each piece of data as the robot transmits live video feed with “real-time” display, on a receiving screen. The audience will see the transmission of commands being secured by MTE packets as each command is sent from the controller to the robot.

A conversation on C6ISR (Connected, Cybersecure, Computer, Command and Control Communications and Intelligence, Surveillance and Reconnaissance) what is C6ISR –next chapter in command and control; fully leveraging commercial infrastructures, COTS, cloud, data integration/analytics for decision making on single pane of glass.